Blog Posts Tagged with "Social Media"

03b2ceb73723f8b53cd533e4fba898ee

LinkedIn: Vulnerability in the Authentication Process

May 22, 2012 Added by:Pierluigi Paganini

This attack is possible due to an error in validating of the security token (CSRF token) that allows an unlimited number of requests using the same token for different users. The only mechanism against the attack is a CAPTCHA challenge-response test after dozens of attempts...

Comments  (1)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Military Intelligence Dives into Cyber

May 21, 2012 Added by:Don Eijndhoven

One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Facebook "Like" Button = Privacy Violation + Security Risk

May 21, 2012 Added by:Matthijs R. Koot

If you walk into a store, would you appreciate it if the owner phoned a random stranger to tell them? Probably not. Yet every time I visit a website that has a Facebook `Like'-button, my browser discloses that visit to Facebook, despite the fact that I do not have a Facebook profile...

Comments  (3)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Social Media Seeks Control Through TOS Enforcement

May 21, 2012 Added by:David Navetta

So far, social media companies have only sought to squash undesirable behavior on their platforms from third party commercial entities, such as spammers or those seeking password sharing, but in the future such litigation could be viable against individual users...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Have You Read the New Facebook Privacy Rules… Again??

May 18, 2012 Added by:Theresa Payton

They know your location, and they confirm what they grab whenever you connect to Facebook: “We receive data from the computer, mobile phone or other device you use to access Facebook. This may include your IP address, location, the type of browser you use, or the pages you visit”...

Comments  (2)

99edc1997453f90eb5ac1430fd9a7c61

Is Lord Sugar a Member of Anonymous?

May 18, 2012 Added by:Javvad Malik

I’m simply asking the question that if Lord Sugar read something he didn’t agree with, and instead of privately sharing his thoughts or being in any way constructive, why did he expose the email address of Kevin OSullivan and invited 2 million people to DDoS his inbox?

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Some Observations on Klout Scores

May 15, 2012 Added by:Ben Rothke

Influence is extremely difficult to measure. In the academic world, the Hirsch number is an index that attempts to measure the impact of a published work, but like every index it can be manipulated. So is Klout an effective method of measuring online influence? From my analysis, no...

Comments  (1)

5e402abc3fedaf8927900f014ccc031f

Five Concerns Surrounding Pinterest

May 10, 2012 Added by:Allan Pratt, MBA

At the current time, there are no privacy or security settings similar to Facebook or Google Plus, and boards cannot be made private, similar to customized Facebook lists or customized Google Plus circles. The bottom line is that anyone with Internet access can view your boards...

Comments  (5)

03b2ceb73723f8b53cd533e4fba898ee

The FBI, Content Monitoring, Backdoors and Going Dark

May 09, 2012 Added by:Pierluigi Paganini

The FBI is working to obtain a backdoor for major social networks like Facebook and also for some of the most used communications platforms such as Skype and Instant Messaging for government surveillance, and is collaborating with companies like Microsoft, Google and Yahoo...

Comments  (4)

Ad5130e786d13531cc0f2cde32dacd0f

Aren’t all Security Professionals Evangelists?

May 08, 2012 Added by:Andrew Weidenhamer

I often wonder is Evangelist the right title for some individuals. Considering that the main audience for a “Security Evangelist” is the security community, I’m not entirely sure how much conversion is actually happening as we all understand the importance of security...

Comments  (2)

B1c4090e84dcfac820a2b8ebe6eee82b

On the Underground Economy of Twitter Followers

May 06, 2012 Added by:Gianluca Stringhini

All Twitter Account Markets we analyzed offer both "free" and "premium" versions. While premium clients pay for their services, the free ones gain followers by giving away their Twitter credentials - a clever way of phishing - or by sending out "promoted" content, typically spam...

Comments  (0)

9f19bdb2d175ba86949c352b0cb85572

Five Steps to a Successful Social Attack

April 29, 2012 Added by:Neira Jones

You might not fall for these attacks, but how many members of your family would? How many employees in your organization would, from field staff to C-level execs? Different people will have different thresholds to these attacks. Security education and awareness is key...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Measures to Protect Business Twitter Accounts

April 27, 2012 Added by:Robert Siciliano

Hacking a business Twitter account is a favorite pastime for those wanting retribution, and for others it’s just plain fun. Once the businesses Twitter account is hacked their reputation is sullied making them look like they aren’t protecting their client’s data either...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Social Media Security 101

April 24, 2012 Added by:Joel Harding

EVERYTHING is compromised. Every web site, every data base, every place that touches the web – I assume this at all times. There is not one among us whose network has not been compromised. The security mantra in the past was “Risk Avoidance”. That is no longer the case...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Good Security Starts at Home

April 23, 2012 Added by:Ben Rothke

Not a day goes by without yet another spate of privacy and security issues. Threats to the security, privacy and personal information continue to increase in scope and complexity. To maintain competitive edge, vendors and service providers are scrambling to keep up...

Comments  (22)

D13f77e036666dbd8f93bf5895f47703

An Enemies Application? Really?

April 20, 2012 Added by:Theresa Payton

We were all taught that if you can’t say anything nice, don’t say anything at all. So imagine our surprise when we found out that there is a free app on Facebook you can publicly name your enemies and give shout outs online as to who they are and why. This is not a good idea..

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »